Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
Title | Dirty COW |
Description | FAQ Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux |
Keywords | N/A |
WebSite | dirtycow.ninja |
Host IP | 104.21.38.183 |
Location | Singapore |
Site | Rank |
US$5,804,498
Last updated: 2023-04-30 13:31:46
dirtycow.ninja has Semrush global rank of 1,823,466. dirtycow.ninja has an estimated worth of US$ 5,804,498, based on its estimated Ads revenue. dirtycow.ninja receives approximately 669,750 unique visitors each day. Its web server is located in Singapore, with IP address 104.21.38.183. According to SiteAdvisor, dirtycow.ninja is safe to visit. |
Purchase/Sale Value | US$5,804,498 |
Daily Ads Revenue | US$5,358 |
Monthly Ads Revenue | US$160,740 |
Yearly Ads Revenue | US$1,928,880 |
Daily Unique Visitors | 44,650 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
dirtycow.ninja. | A | 299 | IP: 104.21.38.183 |
dirtycow.ninja. | A | 299 | IP: 172.67.137.90 |
dirtycow.ninja. | AAAA | 299 | IPV6: 2606:4700:3037::6815:26b7 |
dirtycow.ninja. | AAAA | 299 | IPV6: 2606:4700:3034::ac43:895a |
dirtycow.ninja. | NS | 86400 | NS Record: logan.ns.cloudflare.com. |
dirtycow.ninja. | NS | 86400 | NS Record: june.ns.cloudflare.com. |
dirtycow.ninja. | MX | 300 | MX Record: 20 mx2.zoho.eu. |
dirtycow.ninja. | MX | 300 | MX Record: 50 mx3.zoho.eu. |
dirtycow.ninja. | MX | 300 | MX Record: 10 mx.zoho.eu. |
dirtycow.ninja. | TXT | 300 | TXT Record: google-site-verification=4P7Oy-fOU11FVcuPLyExFVFBx32eZpQawhMTOEM36zI |
Home Twitter Wiki Shop CVE-2016-5195 Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel View Exploit Details FAQ What is the CVE-2016-5195? CVE-2016-5195 is the official reference to this bug. CVE (Common Vulnerabilities and Exposures) is the Standard for Information Security Vulnerability Names maintained by MITRE. Why is it called the Dirty COW bug? " A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. " ( RH ) What makes the Dirty COW bug unique? In fact, all the boring normal bugs are _way_ more important, just because there’s a lot more of them. I don’t think some spectacular security hole should be glorified or cared about as being any more "special" than a random spectacular crash due to |
HTTP/1.1 301 Moved Permanently Date: Sat, 23 Oct 2021 07:58:35 GMT Connection: keep-alive Cache-Control: max-age=3600 Expires: Sat, 23 Oct 2021 08:58:35 GMT Location: https://dirtycow.ninja/ Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=huUryqrbPrJ0WNLVULuLMDLaR6tVtcS%2BuQJk9JpePaAs%2B5c5PWGH6nK908v2Ju6Uw3cj67o%2BLOFmTLj6P0sZPfXlZptQtsuRTqn8AUO%2FqL9zOX5xIiybfUNgO%2Fe9dRU7Mw%3D%3D"}],"group":"cf-nel","max_age":604800} NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800} X-Content-Type-Options: nosniff Server: cloudflare CF-RAY: 6a296bce7ac12a51-ORD alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400 HTTP/2 200 date: Sat, 23 Oct 2021 07:58:35 GMT content-type: text/html; charset=utf-8 last-modified: Wed, 26 Oct 2016 21:40:15 GMT vary: Accept-Encoding access-control-allow-origin: * expires: Sat, 23 Oct 2021 08:08:35 GMT cache-control: max-age=600 x-proxy-cache: MISS x-github-request-id: 2B64:5B2A:16602AE:222ADE5:6173C0AB cf-cache-status: DYNAMIC expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct" report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=KE0qV93Icji2j64n6DG57y4Y8PZ6FAJtnCxUPgnPij%2FPsNqZJ4yMNkOYiFhVMm4jtCXLQrz8NeDc9ubZ2pGYVfHTBu3ZtYhZl6Eat4dELkFppZpEAVkL4b%2BqBpoNdt1uaA%3D%3D"}],"group":"cf-nel","max_age":604800} nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800} strict-transport-security: max-age=15552000; preload x-content-type-options: nosniff server: cloudflare cf-ray: 6a296bcedaaf2b63-ORD alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400 |
Domain Name: dirtycow.ninja Registry Domain ID: 285f7f1d5e304a1d8e8325352604e113-DONUTS Registrar WHOIS Server: whois.godaddy.com/ Registrar URL: http://www.godaddy.com/domains/search.aspx?ci=8990 Updated Date: 2020-12-03T18:28:50Z Creation Date: 2016-10-19T18:28:49Z Registry Expiry Date: 2021-10-19T18:28:49Z Registrar: GoDaddy.com, LLC Registrar IANA ID: 146 Registrar Abuse Contact Email: abuse@godaddy.com Registrar Abuse Contact Phone: +1.4806242505 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant Organization: Domains By Proxy, LLC Registrant State/Province: Arizona Registrant Country: US Name Server: logan.ns.cloudflare.com Name Server: june.ns.cloudflare.com DNSSEC: unsigned >>> Last update of WHOIS database: 2021-09-11T19:31:06Z <<< |